WebADM Framework Administration

WebADM Framework Administration involves managing and configuring the WebADM platform, a web-based application framework used for identity and access management. This includes setting up and maintaining authentication methods, user directories, policies, and services within the framework.

WebADM Administrator Guide

Product Documentation This document is a configuration guide for RCDevs WebADM. The reader should notice that this document is not a guide for configuring WebADM applications (Web Services and WebApps). Specific application guides are available through the RCDevs online documentation library. WebADM installation and setup is not covered by this

Policies & Conditional Access

Overview and policies concepts This guide explains the concept of policies within the WebADM framework. Policies are a crucial component of WebADM, allowing you to design who can access what, when, from which network(s), at what time, and under which conditions. WebADM includes multiple policy layer: * Default application configuration

Certificates Management

Overview This guide provides information on how to issue and revoke different types of certificates (user, server, client, and mobile). Certificates issued by the Rsignd component are stored in two different locations based on their type: * User/admin certificates: These are stored in the user account in the user certificate

Trusted certificate for WebADM admin portal and Web Applications

Overview This documentation provides guidance on how to use your trusted certificate for HTTPS access on port 443 for the WebADM Administrator portal and web applications. It is not recommended to change the certificate used for web service access on port 8443. How to Use my trusted certificate On WebADM

Endpoints and Publication

Overview WebADM is a platform that provides multiple endpoints for various web applications and services. These endpoints are critical for facilitating secure communication and interaction between WebADM and other applications or services. This document outlines the methods for publishing these endpoints, whether on-premises or via RCDevs' cloud infrastructure and

SIEM and Syslog

Overview This HowTo describes how to configure WebADM to send logs to the local syslog and optionally after to a remote syslog (rsyslog) server. Procedure may change according to the operating system, this configuration has been tested with CentOS Stream and RHEL OS. Please, refer to Rsyslog documentation for more

OpenOTP Web Service

Overview OpenOTP, a component of the WebADM Framework, is a versatile web service that provides a robust multi-factor authentication (MFA) solution, enhancing security by requiring additional verification beyond just a username and password. It supports various authentication methods, including FIDO2/Passkeys devices, YubiKeys, OATH hardware tokens, software tokens, push login

API Keys

Overview API keys has been introduced from WebADM 2.3 and is supported with all RCDevs plugins. Instead of using an SSL certificate for client authentication, you have the option to utilize an API key, which can serve as an alternative for secure communication between a client integration and a

LDAP Mount Points

Overview WebADM is always configured with a primary LDAP infrastructure, such as Active Directory, OpenLDAP, Novell, or others. The LDAP Mount Points concept allows you to configure multiple LDAP infrastructures within the same WebADM framework. This enables WebADM to simultaneously work with numerous LDAP infrastructures for managing identities and groups,

LDAP Option Sets

Overview WebADM Option Sets, or "subtree options," allow for granular control over LDAP contexts by defining specific profiles within WebADM. These Option Sets serve various purposes, including: * Unicity Verification Context: Ensures uniqueness within the LDAP subtree. * LDAP View Depth: Limits the LDAP view for delegated administrators to restrict

LDAP Domains

Overview All the WebADM web application or services identify a user with a username, a password and a domain name. The domain objects establish the relationship between a domain name and an LDAP tree base. Also, when an application wants to obtain an LDAP user DN corresponding to the provided

Administrator Roles

Overview WebADM includes the concept of delegated administration and distinguishes between Super Administrators and Other Administrators. * Super Administrators: These are LDAP administrators (e.g., AD Domain Admin users) listed in the super_admins section of conf/webadm.conf. They have unlimited access to all WebADM features. * Other Administrators: These are

Manager APIs

Overview The Manager interface provides access to WebADM user management functions and operations exported by your registered applications. It also allows external systems, such as web portals, to remotely trigger user management operations from the network. The user management functions offer LDAP operations such as object creation, updates, removal, and

Troubleshooting

Overview In this document, we describe how to easily fix some common errors with WebADM, OpenOTP, Web Applications, Radius Bridge, Push login, License services, LDAP permissions etc. WebADM/OpenOTP common issues The first step when a login fails for an unknown reason is to check the log file at /opt/
You've successfully subscribed to RCDevs | Documentation Center
Great! Next, complete checkout for full access to RCDevs | Documentation Center
Welcome back! You've successfully signed in.
Unable to sign you in. Please try again.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info is updated.
Billing info update failed.